Recently, I've heard many security officers talking about using virtual machines as a way to increase security. If your developers need local administrator rights and privileges and they can't have ...
Start-up FireEye made its debut, announcing plans to ship a switch-based network-access control appliance next month that will let customers identify network-borne malware and attacks in order to ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
I've been at several recent conferences where virtual machine (VM) and security “experts” were telling audiences how VM technology can be used to improve computer security. Wow! They are either drunk ...
From a security perspective, containers are the Wild West – full of exciting possibilities, but also unfamiliar dangers. A study out of Forrester points to this mix of hopes and fears. In the report, ...
Back in September, the Center for Internet Security (CIS) released a whitepaper titled "Virtual Machine Security Guidelines - Version 1.0". In it, they addressed security concerns that apply to ...
When VMware Inc. announced its Project Monterey strategy to redefine the data center last week, executives effused about the potential of the distributed processing model to redefine cybersecurity.
The Maze ransomware operators have adopted a tactic previously used by the Ragnar Locker gang; to encrypt a computer from within a virtual machine. In May, we previously reported that Ragnar Locker ...
Ragnar Locker is deploying Windows XP virtual machines to encrypt victim's files while evading detecting from security software installed on the host. Ragnar Locker is a relatively new ransomware ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results